New Heartbleed Exploit Hijacked Secure Network Sessions

Status
Not open for further replies.

rwinches

Distinguished
Jun 29, 2006
117
0
18,640
"the bug exists on firmware that has to be replaced, not updated"

"the makers of the affected VPN concentrator need to create a firmware update for these devices and push it out to their customers."

Yeah cause if you have a very expensive piece of equipment you of course would include the ability to update the firmware.
 

sajidali27

Estimable
Feb 18, 2014
2
0
4,510
First we need to understand Who is affected and who’s not? The second threat is that they got the private keys to your SSL certificate. All of VPN servers have been patched and new keys have been made. Our private CA keys are not stored online and did not need to be changed. <a href="http://www.bestvpnservice.com/blog/how-to-protect-from-heartbleed-bug" title="How to Stay Safe from OpenSSL’s Heartbleed">
 

MalcolmTucker

Estimable
Apr 19, 2014
4
0
4,510
Apple "AirPort Utility" also uses OpenSSL according to the Licensing documents.

Until Apple provides a new release of "Airport Utility", it's likely best for Apple Users to go to their Applications > Utilities Folder and place "Airport Utility into the trash.

Doing this exercise will protect Apple users from the vulnerabilities that may be present in the Apple Software, that Apple doesn't want to disclose. Remember- Apple's culture is based on a different release type. It's

Deny -> Replace -> Market and brand the update -> Admit there was a problem -> Put Phil Schiller in an on-stage demo where he's wearing a speedo that turns Tim Cook on.
 

Blessedman

Distinguished
May 29, 2001
257
0
18,930
Everyone keeps looking at hackers, I am looking at the NSA (with backing from the MPAA and the RIAA) at a grab for the future of the net.
 

Dr-Emmerich

Estimable
Mar 27, 2014
6
0
4,510
Apple "AirPort Utility" also uses OpenSSL according to the Licensing documents.

Until Apple provides a new release of "Airport Utility", it's likely best for Apple Users to go to their Applications > Utilities Folder and place "Airport Utility into the trash.

Doing this exercise will protect Apple users from the vulnerabilities that may be present in the Apple Software, that Apple doesn't want to disclose. Remember- Apple's culture is based on a different release type. It's

Deny -> Replace -> Market and brand the update -> Admit there was a problem -> Put Phil Schiller in an on-stage demo where he's wearing a speedo that turns Tim Cook on.

You have NO idea what you're talking about... worst kind of troll.
 
Status
Not open for further replies.